Skip to main content
Top
Published in: Computing 2/2024

18-11-2023 | Regular Paper

Can we quantify trust? Towards a trust-based resilient SIoT network

Authors: Subhash Sagar, Adnan Mahmood, Quan Z. Sheng, Munazza Zaib, Farhan Sufyan

Published in: Computing | Issue 2/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The emerging yet promising paradigm of the Social Internet of Things (SIoT) integrates the notion of the Internet of Things with human social networks. In SIoT, objects, i.e., things, have the capability to socialize with the other objects in the SIoT network and can establish their social network autonomously by modeling human behaviour. The notion of trust is imperative in realizing these characteristics of socialization in order to assess the reliability of autonomous collaboration. The perception of trust is evolving in the era of SIoT as an extension to traditional security triads in an attempt to offer secure and reliable services, and is considered as an imperative aspect of any SIoT system for minimizing the probable risk of autonomous decision-making. This research investigates the idea of trust quantification by employing trust measurement in terms of direct trust, indirect trust as a recommendation, and the degree of the SIoT relationships in terms of social similarities (community-of-interest, friendship, and co-work relationships). A weighted sum approach is subsequently employed to synthesize all the trust features in order to ascertain a single trust score. The experimental evaluation demonstrates the effectiveness of the proposed model in segregating the trustworthy and the untrustworthy objects, and illustrates the superior performance of the proposed trust model over state-of-the-art trust models.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ashton K (2009) That ‘Internet of Things’ thing. Comput Commun 22(7):97–114 Ashton K (2009) That ‘Internet of Things’ thing. Comput Commun 22(7):97–114
2.
go back to reference Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805CrossRef Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805CrossRef
3.
go back to reference Zhang WE, Sheng QZ, Mahmood A, Tran DH, Zaib M, Hamad SA, Aljubairy A, Alhazmi AAF, Sagar S, and Ma C (2020) The 10 research topics in the internet of things. In: IEEE 6th International Conference on Collaboration and Internet Computing (CIC), pp 34–43 Zhang WE, Sheng QZ, Mahmood A, Tran DH, Zaib M, Hamad SA, Aljubairy A, Alhazmi AAF, Sagar S, and Ma C (2020) The 10 research topics in the internet of things. In: IEEE 6th International Conference on Collaboration and Internet Computing (CIC), pp 34–43
4.
go back to reference Atzori L, Iera A, Morabito G, Nitti M (2012) The social Internet of Things (SIoT) - when social networks meet the internet of things: concept, architecture, and network characterization. Comput Netw 56(16):3594–3608CrossRef Atzori L, Iera A, Morabito G, Nitti M (2012) The social Internet of Things (SIoT) - when social networks meet the internet of things: concept, architecture, and network characterization. Comput Netw 56(16):3594–3608CrossRef
5.
go back to reference Cai Z, He Z, Guan X, Li Y (2018) Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans Depend Secure Comput 15(4):577–590 Cai Z, He Z, Guan X, Li Y (2018) Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans Depend Secure Comput 15(4):577–590
6.
go back to reference Shirvani MH, Masdari M (2023) A survey study on trust-based security in internet of things: challenges and issues. Internet Things 21:100640CrossRef Shirvani MH, Masdari M (2023) A survey study on trust-based security in internet of things: challenges and issues. Internet Things 21:100640CrossRef
7.
go back to reference Mahmood A, Sheng QZ, Zhang WE, Wang Y, Sagar S (2023) Toward a distributed trust management system for misbehavior detection in the internet of vehicles. ACM Trans Cyber-Phys Syst 7(3):1–25CrossRef Mahmood A, Sheng QZ, Zhang WE, Wang Y, Sagar S (2023) Toward a distributed trust management system for misbehavior detection in the internet of vehicles. ACM Trans Cyber-Phys Syst 7(3):1–25CrossRef
8.
go back to reference Meng X, Liu D (2018) GeTrust: a guarantee-based trust model in chord-based P2P networks. IEEE Trans Depend Secure Comput 15(1):54–68CrossRef Meng X, Liu D (2018) GeTrust: a guarantee-based trust model in chord-based P2P networks. IEEE Trans Depend Secure Comput 15(1):54–68CrossRef
9.
go back to reference Liu G, Li C and Yang Q (2019) NeuralWalk: trust assessment in online social networks with neural networks. In proceeding of IEEE Conference on Computer Communications (INFOCOM), pp 1999–2007 Liu G, Li C and Yang Q (2019) NeuralWalk: trust assessment in online social networks with neural networks. In proceeding of IEEE Conference on Computer Communications (INFOCOM), pp 1999–2007
10.
go back to reference Rahimi Hand El Bakkali H (2013) A new reputation algorithm for evaluating trustworthiness in e-commerce context. In: proceeding of National Security Days (JNS3), pp 1–6 Rahimi Hand El Bakkali H (2013) A new reputation algorithm for evaluating trustworthiness in e-commerce context. In: proceeding of National Security Days (JNS3), pp 1–6
11.
go back to reference Sagar S, Mahmood A, Kumar J, and Sheng QZ (2020) A time-aware similarity-based trust computational model for social internet of things. In: IEEE Global Communications Conference (GLOBECOM), pp 1–60 Sagar S, Mahmood A, Kumar J, and Sheng QZ (2020) A time-aware similarity-based trust computational model for social internet of things. In: IEEE Global Communications Conference (GLOBECOM), pp 1–60
12.
go back to reference Rousseau DM, Sitkin SB, Burt RS, Camerer C (1998) Not so different after all: a cross-discipline view of trust. Acad Manag Rev 23(3):393–404CrossRef Rousseau DM, Sitkin SB, Burt RS, Camerer C (1998) Not so different after all: a cross-discipline view of trust. Acad Manag Rev 23(3):393–404CrossRef
13.
go back to reference Khan WZ, Arshad Q–A, Hakak S, Khan MK, Saeed-Ur-Rehman (2021) Trust management in social internet of things: architectures, recent advancements, and future challenges. IEEE Internet Things J 8(10):7768–7788CrossRef Khan WZ, Arshad Q–A, Hakak S, Khan MK, Saeed-Ur-Rehman (2021) Trust management in social internet of things: architectures, recent advancements, and future challenges. IEEE Internet Things J 8(10):7768–7788CrossRef
14.
go back to reference Sagar S, Mahmood A, Sheng QZ, Pabani JK, and Zhang WE (2022) Understanding the trustworthiness management in the social internet of things: a survey. arXiv preprint arXiv:2202.03624 Sagar S, Mahmood A, Sheng QZ, Pabani JK, and Zhang WE (2022) Understanding the trustworthiness management in the social internet of things: a survey. arXiv preprint arXiv:​2202.​03624
15.
go back to reference Thompson K (1984) Reflections on trusting trust. Commun ACM 27(8):761–763CrossRef Thompson K (1984) Reflections on trusting trust. Commun ACM 27(8):761–763CrossRef
16.
go back to reference Amin F, Ahmad A, Choi GS (2019) Towards trust and friendliness approaches in the social internet of things. Appl Sci 9(1):166CrossRef Amin F, Ahmad A, Choi GS (2019) Towards trust and friendliness approaches in the social internet of things. Appl Sci 9(1):166CrossRef
17.
go back to reference Truong N, Lee H, Askwith B, Lee GM (2017) Toward a trust evaluation mechanism in the social internet of things. Sensors 17:1346CrossRef Truong N, Lee H, Askwith B, Lee GM (2017) Toward a trust evaluation mechanism in the social internet of things. Sensors 17:1346CrossRef
18.
go back to reference Alam S, Zardari S, Noor S, Ahmed S, Mouratidis H (2022) Trust management in social internet of things (SIoT): a survey. IEEE Access 10:108924–108954CrossRef Alam S, Zardari S, Noor S, Ahmed S, Mouratidis H (2022) Trust management in social internet of things (SIoT): a survey. IEEE Access 10:108924–108954CrossRef
19.
go back to reference Latif R (2022) ConTrust: a novel context-dependent trust management model in social internet of things. IEEE Access 10:46526–46537CrossRef Latif R (2022) ConTrust: a novel context-dependent trust management model in social internet of things. IEEE Access 10:46526–46537CrossRef
20.
go back to reference Rizwanullah M, Singh S, Kumar R, Alrayes FS, Alharbi A, Alnfiai MM, Chaurasia PK, Agrawal A (2023) Development of a model for trust management in the social internet of things. Electronics 12(1):41CrossRef Rizwanullah M, Singh S, Kumar R, Alrayes FS, Alharbi A, Alnfiai MM, Chaurasia PK, Agrawal A (2023) Development of a model for trust management in the social internet of things. Electronics 12(1):41CrossRef
21.
go back to reference Sagar S, Mahmood A, Wang K, Sheng QZ, Pabani JK, and Zhang WE (2023) Trust–SIoT: towards trustworthy object classification in the social internet of things. IEEE Transactions on Network and Service Management, pp 1–1 Sagar S, Mahmood A, Wang K, Sheng QZ, Pabani JK, and Zhang WE (2023) Trust–SIoT: towards trustworthy object classification in the social internet of things. IEEE Transactions on Network and Service Management, pp 1–1
22.
go back to reference Wei L, Wu J, Long C, Li B (2021) On designing context-aware trust model and service delegation for social internet of things. IEEE Internet Things J 8(6):4775–4787CrossRef Wei L, Wu J, Long C, Li B (2021) On designing context-aware trust model and service delegation for social internet of things. IEEE Internet Things J 8(6):4775–4787CrossRef
23.
go back to reference Zhang S, Zhang D, Wu Y, and Zhong H (2023) Service recommendation model based on trust and QoS for social internet of things. IEEE Transactions on Services Computing, pp 1–14 Zhang S, Zhang D, Wu Y, and Zhong H (2023) Service recommendation model based on trust and QoS for social internet of things. IEEE Transactions on Services Computing, pp 1–14
24.
go back to reference Yu Z, Jin D, Huo C, Wang Z, Liu X, Qi H, Wu J, and Wu L (2023) KGTrust: evaluating trustworthiness of SIoT via knowledge enhanced graph neural networks. In: Proceedings of the ACM Web Conference 2023, pp 727–736 Yu Z, Jin D, Huo C, Wang Z, Liu X, Qi H, Wu J, and Wu L (2023) KGTrust: evaluating trustworthiness of SIoT via knowledge enhanced graph neural networks. In: Proceedings of the ACM Web Conference 2023, pp 727–736
25.
go back to reference Pourmohseni S, Ashtiani M, Azirani AA (2022) A computational trust model for social IoT based on interval neutrosophic numbers. Inform Sci 607:758–782CrossRef Pourmohseni S, Ashtiani M, Azirani AA (2022) A computational trust model for social IoT based on interval neutrosophic numbers. Inform Sci 607:758–782CrossRef
26.
go back to reference Truong NB, Lee GM, Um T, Mackay M (2019) Trust evaluation mechanism for user recruitment in mobile crowd-sensing in the internet of things. IEEE Trans Inf Foren Secur 14(10):2705–2719CrossRef Truong NB, Lee GM, Um T, Mackay M (2019) Trust evaluation mechanism for user recruitment in mobile crowd-sensing in the internet of things. IEEE Trans Inf Foren Secur 14(10):2705–2719CrossRef
27.
go back to reference Alnasser A, Sun H, Jiang J (2020) Recommendation-based trust model for vehicle-to-everything (V2X). IEEE Internet Things J 7(1):440–450CrossRef Alnasser A, Sun H, Jiang J (2020) Recommendation-based trust model for vehicle-to-everything (V2X). IEEE Internet Things J 7(1):440–450CrossRef
28.
go back to reference Mohammadi V, Rahmani AM, Darwesh A, Sahafi A (2021) Trust-based friend selection algorithm for navigability in social internet of things. Knowle-Based Syst 232:107479CrossRef Mohammadi V, Rahmani AM, Darwesh A, Sahafi A (2021) Trust-based friend selection algorithm for navigability in social internet of things. Knowle-Based Syst 232:107479CrossRef
29.
go back to reference Shitharth, Mouratidis H (2023) A quantum trust and consultative transaction-based blockchain cybersecurity model for healthcare systems. Sci Rep 13:05 Shitharth, Mouratidis H (2023) A quantum trust and consultative transaction-based blockchain cybersecurity model for healthcare systems. Sci Rep 13:05
30.
go back to reference Jayasinghe U, Lee GM, Um T, Shi Q (2019) Machine learning based trust computational model for IoT services. IEEE Trans Sustain Comput 4(1):39–52CrossRef Jayasinghe U, Lee GM, Um T, Shi Q (2019) Machine learning based trust computational model for IoT services. IEEE Trans Sustain Comput 4(1):39–52CrossRef
31.
go back to reference Magdich R, Jemal H, Ayed MB (2022) A resilient trust management framework towards trust related attacks in the social internet of things. Comput Commun 191:92–107CrossRef Magdich R, Jemal H, Ayed MB (2022) A resilient trust management framework towards trust related attacks in the social internet of things. Comput Commun 191:92–107CrossRef
32.
go back to reference Xia H, Xiao F, Zhang S, Hu C and Cheng X (2019) Trustworthiness inference framework in the social internet of things: a context-aware approach. In: proceeding of IEEE Conference on Computer Communications (INFOCOM), pp 838–846 Xia H, Xiao F, Zhang S, Hu C and Cheng X (2019) Trustworthiness inference framework in the social internet of things: a context-aware approach. In: proceeding of IEEE Conference on Computer Communications (INFOCOM), pp 838–846
33.
go back to reference Amiri-Zarandi M, Dara RA, Fraser E (2022) LBTM: a lightweight blockchain-based trust management system for social internet of things. The J Supercomput 78(6):8302–8320CrossRef Amiri-Zarandi M, Dara RA, Fraser E (2022) LBTM: a lightweight blockchain-based trust management system for social internet of things. The J Supercomput 78(6):8302–8320CrossRef
34.
go back to reference Kouicem DE, Imine Y, Bouabdallah A, Lakhlef H (2022) Decentralized blockchain-based trust management protocol for the internet of things. IEEE Trans Depend Secure Comput 19(2):1292–1306 Kouicem DE, Imine Y, Bouabdallah A, Lakhlef H (2022) Decentralized blockchain-based trust management protocol for the internet of things. IEEE Trans Depend Secure Comput 19(2):1292–1306
35.
go back to reference Alam S, Zardari S, Shamsi JA (2022) Blockchain-based trust and reputation management in SIoT. Electronics 11(23):3871CrossRef Alam S, Zardari S, Shamsi JA (2022) Blockchain-based trust and reputation management in SIoT. Electronics 11(23):3871CrossRef
36.
go back to reference Selvarajan S, Srivastava G, Khadidos AO, Khadidos AO, Baza M, Alshehri A, and Lin JC-W (2023) An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems. J Cloud Comput 12(1) Selvarajan S, Srivastava G, Khadidos AO, Khadidos AO, Baza M, Alshehri A, and Lin JC-W (2023) An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems. J Cloud Comput 12(1)
37.
go back to reference Ismail R, Jøsang A (2002) The beta reputation system. In: 15th Bled Electronics Commerce Conference, 2502–2511, 2002 Ismail R, Jøsang A (2002) The beta reputation system. In: 15th Bled Electronics Commerce Conference, 2502–2511, 2002
38.
go back to reference Nitti M, Girau R, Atzori L, Member S (2014) Trustworthiness management in the social internet of things. IEEE Trans Knowl Data Eng 26(5):1253–1266CrossRef Nitti M, Girau R, Atzori L, Member S (2014) Trustworthiness management in the social internet of things. IEEE Trans Knowl Data Eng 26(5):1253–1266CrossRef
39.
go back to reference Chen I, Guo J, Bao F (2016) Trust management for SOA-based IoT and its application to service composition. IEEE Trans Serv Comput 9(3):482–495CrossRef Chen I, Guo J, Bao F (2016) Trust management for SOA-based IoT and its application to service composition. IEEE Trans Serv Comput 9(3):482–495CrossRef
40.
go back to reference Pietilainen AK and Diot C (2009) Crawdad dataset sigcomm2009. https://crawdad.org/thlab/sigcomm2009/20120715. 2012-07-15 Pietilainen AK and Diot C (2009) Crawdad dataset sigcomm2009. https://​crawdad.​org/​thlab/​sigcomm2009/​20120715.​ 2012-07-15
41.
go back to reference Pownuk A, Kreinovich V (2017) Why linear interpolation? Mathe Struct Model 43(3):43–49 Pownuk A, Kreinovich V (2017) Why linear interpolation? Mathe Struct Model 43(3):43–49
42.
go back to reference Jafarian B, Yazdani N, Haghighi MS (2020) Discrimination-aware Trust Management for Social Internet of Things. Comput Netw 178:107254CrossRef Jafarian B, Yazdani N, Haghighi MS (2020) Discrimination-aware Trust Management for Social Internet of Things. Comput Netw 178:107254CrossRef
Metadata
Title
Can we quantify trust? Towards a trust-based resilient SIoT network
Authors
Subhash Sagar
Adnan Mahmood
Quan Z. Sheng
Munazza Zaib
Farhan Sufyan
Publication date
18-11-2023
Publisher
Springer Vienna
Published in
Computing / Issue 2/2024
Print ISSN: 0010-485X
Electronic ISSN: 1436-5057
DOI
https://doi.org/10.1007/s00607-023-01236-z

Other articles of this Issue 2/2024

Computing 2/2024 Go to the issue

Premium Partner